Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Vulnerability in VM2 Sandbox Library for Node.js Let Attackers run Untrusted Code

Critical Vulnerability in VM2 Sandbox Library for Node.js Let Attackers run Untrusted Code

Posted on January 28, 2026January 28, 2026 By CWS

A vital sandbox escape vulnerability has been recognized in vm2. This extensively used Node.js library offers sandbox isolation for executing untrusted code.

The flaw, tracked as CVE-2026-22709 (GHSA-99p7-6v5w-7xg8), impacts all variations as much as and together with 3.10.0 and carries a CVSS v3.1 base rating of 10.0, indicating most severity.

The vulnerability stems from incomplete callback sanitization in Promise prototype dealing with.

Whereas the vm2 builders sanitized callbacks for localPromise.prototype.then, the sanitization doesn’t apply to globalPromise.prototype.then.

Since async features return world Promise objects moderately than native ones, attackers can bypass sandbox restrictions and acquire code execution privileges on the underlying host system.

VM2 Sandbox Vulnerability

The vulnerability exploits an asymmetry in callback sanitization throughout promise chains.

Researchers found that Promise.prototype.catch callbacks might be manipulated by means of error stack manipulation.

CVE IDPackageAffected VersionsCVSS ScoreVulnerability TypeAttack VectorCVE-2026-22709vm2 (npm)≤ 3.10.010.0Sandbox EscapeNetwork

By creating an error object with a symbolic title and triggering an async perform, an attacker positive factors entry to the Error constructor, which finally permits arbitrary code execution through the Operate constructor.

The assault chain leverages this development to instantiate a Operate object with arbitrary payload code.

In proof-of-concept demonstrations, attackers have efficiently executed system instructions resembling execSync() through entry to the child_process module, utterly circumventing the sandbox isolation layer.

VM2 maintainers launched model 3.10.2, a patched model, to deal with the flaw.

This replace correctly sanitizes Promise callbacks throughout each native and world prototype chains, closing the sandbox escape vector.

Organizations utilizing vm2 ought to instantly improve to model 3.10.2 or later.

The package deal co-founder, Patrik Šimek, revealed a GitHub advisory two days in the past, displaying energetic upkeep and a speedy response to the safety situation

Improvement groups counting on VM2 for code sandboxing ought to deal with this as a vital precedence.

Conduct fast stock assessments throughout growth and manufacturing environments to determine affected deployments.

Deploy model 3.10.2 by means of your package deal administration pipeline directly, and validate that no manufacturing situations stay on weak variations.

Till patching is full, contemplate limiting VM2 execution contexts to trusted code solely.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attackers, Code, Critical, Library, Node.js, Run, Sandbox, Untrusted, VM2, Vulnerability

Post navigation

Previous Post: Attackers Hijacking Official GitHub Desktop Repository to Distribute Malware as Official Installer
Next Post: Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected

Related Posts

Tata Motors Data Leak – 70+ TB of Sensitive Info and Test Drive Data Exposed via AWS Keys Tata Motors Data Leak – 70+ TB of Sensitive Info and Test Drive Data Exposed via AWS Keys Cyber Security News
Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave Cyber Security News
Mozilla High Severity Vulnerabilities Enables Remote Code Execution Mozilla High Severity Vulnerabilities Enables Remote Code Execution Cyber Security News
Blockchain Security – Protecting Decentralized Systems Blockchain Security – Protecting Decentralized Systems Cyber Security News
Exposed Open Directory Leaks BYOB Framework Across Windows, Linux, and macOS Exposed Open Directory Leaks BYOB Framework Across Windows, Linux, and macOS Cyber Security News
Critical SolarWinds Vulnerability Exposes 170 Installations Critical SolarWinds Vulnerability Exposes 170 Installations Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News